US11244076B2 - Method for enabling trust in collaborative research - Google Patents
Method for enabling trust in collaborative research Download PDFInfo
- Publication number
- US11244076B2 US11244076B2 US16/552,705 US201916552705A US11244076B2 US 11244076 B2 US11244076 B2 US 11244076B2 US 201916552705 A US201916552705 A US 201916552705A US 11244076 B2 US11244076 B2 US 11244076B2
- Authority
- US
- United States
- Prior art keywords
- data
- transaction
- layer
- sharing
- pointer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2358—Change logging, detection, and notification
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2379—Updates performed during online database operations; commit processing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H50/00—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
- G16H50/30—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for calculating health indices; for individual health risk assessment
Definitions
- the present application relates to a method enabling verifiable trust in collaborative data-sharing environments.
- the era of immense data analytics is transforming health care with the ability to interpret large and diverse datasets to provide better diagnoses, manage complex diseases, improve efficiency of care, and generate aggregated data for Artificial Intelligence (AI) systems [1].
- AI Artificial Intelligence
- Alphabet the parent company of Google
- Cityblock Health the new initiative
- IBM Watson's cognitive computing platform uses multiple large datasets to generate predictive analytics for improved diagnoses.
- FIG. 1 conceptualizes the collaborative research pipeline for such a scenario, where hospitals h 0 , hn provide data for participants and multiple researchers r 0 , rn and AI systems a 0 , . . . , an provide data analytics on the datasets. Hospitals continuously provide data as it is generated, and DSA 0 , . . . , DSAn govern access to the datasets in the research pipeline. Auditing the data lifecycle (from collection to use, disclosure and transformation) is essential in this scenario to ensure accountability. Typically, local and global auditors oversee the process [4], and the trust between different auditors and researchers is a presumption, however in reality there are conflicts of interests that may undermine the presumed trust [5].
- a trusted system means that all parties accept the actions of the system to be correct, the system's outputs to be true, and that the system will complete its expected task [6].
- the trustworthiness of a system depends on the level of perceived trust of each system component [7].
- trust is a subjective measurement based on the perception of how different parties evaluate each other and the systems they interact with.
- Achieving a trustworthy system requires transforming the notion of trust into an objective measurement. This transformation often relies on the use of a centralized trusted third party, where all collaborating parties trust this external entity (e.g., certificate authorities in public key infrastructures [8], arbitrated protocols [9]).
- Establishing trust through a centralized third party is often the source of collusion, which threatens the trust, the very central notion that collaborative parties intend to establish.
- the Enron Scandal [10] is a textbook case when the trust placed in the centralized auditors was a major factor in the fraud. Rather than a centralized approach, we can leverage a distributed system to support trust between collaborating parties and alleviate the disadvantages that tend to threaten trust in centralized systems.
- FIG. 1 shows the collaborative research pipeline.
- FIG. 2 shows the system actors and requirements
- FIG. 3 shows the architecture layers
- FIG. 4 shows the data sharing transaction sequence
- FIG. 5 shows a data sharing event graph
- FIG. 6 shows a privacy event graph
- FIG. 7 shows a signature event graph
- FIG. 8 shows an architecture realization
- FIG. 9 shows elapsed execution times for a) data sharing transaction generation and b) integrity verification
- the term “comprising” and its derivatives, as used herein, are intended to be open ended terms that specify the presence of the stated features, elements, components, groups, integers, and/or steps, but do not exclude the presence of other unstated features, elements, components, groups, integers and/or steps.
- the foregoing also applies to words having similar meanings such as the terms, “including”, “having” and their derivatives.
- the term “consisting” and its derivatives, as used herein, are intended to be closed terms that specify the presence of the stated features, elements, components, groups, integers, and/or steps, but exclude the presence of other unstated features, elements, components, groups, integers and/or steps.
- a common approach for maintaining trust in collaborative environments relies on a centralized party to oversee researchers' activities. Centralized systems are generally sources of data breaches and more importantly, collusion between actors is difficult to prevent or detect. With the emergence of blockchain technology, the issues involved with a centralized trust system are alleviated through the use of distributed trust where all interactions are distributed, immutable, transparent and consensually agreed upon. Adapting blockchain from the typical crypto-currency use case to collaborative health research requires overcoming multiple challenges. First, transactions in health research involve immense data sizes (e.g., an entire health record with all medical imaging history [15]). Second, specific privacy statements must be captured for each individual data item, which might be applicable for all transactions. Therefore, blockchain adaptation for health research transactions requires careful investigation of the relationship between data and what is stored on the blockchain and the privacy of data subjects.
- Actors involved in collaborative health research include the data contributors (e.g., patients), data custodians (e.g., hospitals and research institutes), AI systems (e.g., active machine learning system [16]), researchers, and auditors.
- Patients are the source of the contributed data (e.g., subject of a CT scan) while data custodians store this data in their information systems.
- the data contributors want to know who is accessing and sharing their data, as well as when and what through some consent mechanisms.
- Data custodians are responsible for securely storing private health data while researchers require access to this data to perform analysis.
- AI systems also need to access patient data to update their predictive models.
- auditors monitor the system actors to determine compliance to privacy policies stated in DSAs and consent directives. The details of each actor type and their specific requirements are summarized in FIG. 2 .
- Security properties that support trustworthy systems are grouped into six domains: confidentiality, integrity, availability, authentication (access control), non-repudiation, and accountability (transparency) [7].
- Confidentiality and integrity define mechanisms that prevent the unauthorized reading and writing of data, respectively.
- Mechanisms such as encryption, digital signatures, and cryptographic hash functions support these properties. Ensuring that resources are accessible when required by authorized users falls under the availability category.
- Our proposed architecture relies on external mechanisms to support the availability of the system and is therefore considered out of scope for this research.
- Authentication and access control provide processes for verifying the identity of an entity and maintaining the entity's privilege across the system, respectively.
- An ideal trustworthy system aims to support all six domains and properties to establish digitized trust. Especially in a health research environment that deals with private patient data, our proposed architecture must support these trust properties to provide a trustworthy system.
- our architecture should support three main functionalities: provenance management of research data, privacy management of data subjects, and distributed and verifiable trust among participants.
- the data layer responsible for generating data pointers that link to the medical records and can be shared among actors. Data pointers allow for the data custodians to remain in operational control of the data and provide their institutional-based access control mechanisms to protect the data.
- the middle layer is the transaction layer responsible for providing a mechanism for storing and querying data sharing transactions, including provenance and privacy information.
- the transparency layer responsible for distributed trust between all participants by allowing all data transactions to be transparent among all participants.
- a layered approach has multiple advantages. The functionality and the applied technology can be decoupled so that connections between components are clearly defined and a component does not rely on the internal logic and the technology used in other components.
- a permissioned blockchain can be used as a plug-in for the transparency layer without changing any blockchain properties.
- the relationships between layers and how the layers work together are describe below. The internal specifications of each layer are described in subsequent subsections.
- the collaborative research pipeline involves multiple actors interacting with each other and sharing private health data.
- the sequence diagram in FIG. 4 depicts a dynamic view of the architecture in FIG. 3 and demonstrates an instance of the research pipeline where data is being shared between two researchers (r 0 and r 1 ). DSAs are established between the researchers that outline the privacy policies that the researchers must abide by when using the data.
- the sending entity r 0
- the sending entity first interacts with the data layer to generate a pointer to the data that she wants to share.
- the data accessible by the pointer is stored in the data layer's data repository, which is hosted at a hospital or research institute.
- a data sharing transaction which is composed of a data sharing event, privacy event, and signing event. These events provide the transaction metadata (including the pointer generated in the data layer), privacy policies related to the data, and a digital signature of the transaction.
- the data sharing transaction is stored in a data query endpoint so that other actors can query the transactional data.
- An integrity proof (i.e., cryptographic hash) of the data sharing transaction is computed and written to the transparency layer so that all participants are aware of the transaction.
- Integrity verification consists of recomputing the integrity proof of the data sharing transaction and comparing it to the integrity proof in the transparency layer. If both integrity proofs match, researcher r 1 can proceed to accessing the data through the data pointer specified in the data sharing transaction. Alternatively, if the integrity proof verification fails, researcher r 1 should not access the data and an auditor can perform further investigation. Researcher r 1 then queries the transaction layer to determine the privacy policies they must abide by when using the data and then accesses the data through the data pointer at the data layer. Finally, auditors query the transaction and transparency layers to check the compliance of all participants with the policies in the governing DSAs.
- the data layer acts as a data repository where the data pointers that are shared among actors reference the actual data records.
- FHIR Fast Healthcare Interoperability Resources
- a set of modular components called Resources are at the core of the FHIR framework [17]. Resources represent healthcare concepts, such as patients, providers, medications, and diagnostics. Each resource has a unique URL (uniform resource locator) and can be retrieved and manipulated through these URLs.
- URL uniform resource locator
- authorized actors access the data using the FHIR URLs.
- a data sharing transaction is generated by the transaction layer.
- This transaction is composed of a data sharing event, privacy event, and signing event as shown in FIG. 4 .
- We define Linked Data named graphs [19] for each type of event. The graphs are stored in an externally accessible data query endpoint, such as a quad store or SPARQL endpoint, so that they can be queried by other authorized actors in the system.
- T pointer transactions specify that the transaction is sharing data pointers referencing patient data and are performed by the actors that store, generate, or manage the actual data (i.e., researchers, data custodians).
- the T pointer transactions can be queried by AI systems and by following the data pointer, the referenced data can be retrieved to update the AI system's predictive algorithm.
- T outcome transactions are performed by AI systems and specify that the transaction is sharing the results computed by their algorithms. The differentiation between T pointer and T outcome transactions allows actors to track transactions relating to data sharing and AI system predictive outcomes over the course of the research pipeline, as well as provide feedback for the AI system improvement.
- L2TAP Linked Data Log to Accountability, Transparency, and Privacy
- FIG. 6 is an example of an L2TAP privacy event, which consists of a header that asserts provenance semantics (lines 4-8), and a body that asserts privacy semantics (lines 9-16).
- This privacy event is an example of an access request (line 10) that contains properties for specifying the requested data item(s) (line 14), the purpose of access (line 15), and the data sender and requester (lines 12 and 11, respectively).
- L2TAP privacy events can also provide assertions of requested privacy privileges (omitted); more details can be found in [20], [21].
- a signature event graph ( FIG. 7 ) is used for integrity verification and provides participant non-repudiation so that data sharing actions cannot be denied.
- a data sender's digital signature of a data sharing and privacy event graph is captured in the signature event (line 6).
- the signer's public key used to verify the signature can be obtained through the signer's WebID [22] in line 5.
- the signed data sharing and privacy event graphs are referenced in line 7.
- Information describing how to verify the signature is also asserted in the graph, such as signing algorithms used (omitted). The specific algorithm for computing digital signatures for graphs is described further in [21].
- Blockchain technology is a suitable candidate to operate at the transparency layer by providing mechanisms to record tamper-proof data transactions among multiple untrusted actors through its distributed consensus network [23], [24], [25], [26].
- a blockchain is a decentralized database composed of a continuously increasing amount of records, or blocks, that represents an immutable digital ledger of transactions [27].
- Distributed ledgers allow for a shared method of record keeping where each participant has a copy of the ledger, meaning that a majority of participants (i.e., nodes on the network) will have to be in collusion to modify the records in the blockchain.
- Each record, or block, in the blockchain is comprised of a header containing a cryptographic hash of the previous block (forming a chain of blocks) and a payload of transactions.
- Blockchain is the technology behind the popular Bitcoin crypto-currency [28], where the blockchain provides a secure and consensus-driven record of monetary transactions between participants on the network. Similar to how Bitcoin leverages blockchain, our architecture leverages a blockchain to provide transparent and tamper-proof data sharing transactions. However, unlike the popular use of blockchain for crypto-currencies (e.g. Bitcoin [28]), which is public in nature, our blockchain network is private, or permissioned, since we are dealing with personal health information and the network participants are known (i.e., the network is composed of the actors in the collaborative research environment). Since the network is permissioned, we forgo the computationally expensive cryptographic consensus protocol used in public blockchain networks, and leverage participant signature-driven consensus protocols instead.
- crypto-currencies e.g. Bitcoin [28]
- our blockchain network is private, or permissioned, since we are
- a data sharing transaction that is generated in the transaction layer is hashed using a cryptographic hash function to generate an integrity proof of the data sharing transaction (i.e., data sharing event, privacy event, signing event graphs).
- a cryptographic hash function to generate an integrity proof of the data sharing transaction (i.e., data sharing event, privacy event, signing event graphs).
- There are numerous methods for computing a digest of Linked Data graphs e.g., [29], [30], [31], [32]
- a comparative analysis of integrity proof methods was performed in [33].
- Incremental cryptography produces an integrity proof of Linked Data graphs by hashing each statement in the graphs and using a commutative operation (e.g., multiplication) modulo a large prime number to merge the statement hashes into an integrity proof
- n is the number of statements in the graphs
- h is a cryptographic hash function (e.g., SHA-256)
- si is a graph statement
- p is a large prime number.
- the data sharing transaction integrity proof is stored on the blockchain to have an immutable record of the transaction and for actors to be aware of the transaction.
- the tuple serves as a tamper-proof record of the data sharing transaction and is composed of an integrity proof of the data sharing transaction, the sender and receiver of the transaction (e.g., researcher, AI system), and the transaction type (i.e., T pointer or T outcome ).
- the transparency layer supports human-in-the-loop functionality, even for patients as the data contributors in the collaborative health research environment.
- Inherent to blockchain technology all participants in the network contribute and maintain the ledger of transactions. Therefore, all participants can audit data sharing transactions by verifying the integrity proofs on the blockchain and querying privacy events in the transaction layer to determine compliance and adherence to DSA policies and consent directives.
- FIG. 8 We map our proposed architecture in FIG. 3 to existing and emerging technologies to demonstrate the feasibility of such a system in a realistic collaborative health research environment.
- the technological realization is depicted in FIG. 8 .
- the data layer is mapped to a FHIR server from hospital information systems (HIS) that provide the data pointer services.
- a quad store with a SPARQL query endpoint (Virtuoso Universal Server [38]) is used for the transaction layer where the data transaction graphs are stored (and accessible through SPARQL queries).
- the transparency layer requires a permissioned blockchain network, so we utilized the Hyperledger Fabric blockchain platform [39].
- Hyperledger Fabric is composed of three organizations (representing research institutes or hospitals) with each organization running two peers, as shown in FIG. 8 .
- the Fabric network also has a dedicated VM running as the network orderer and is attached to a Kafka-Zookeeper ordering service (for providing efficient transaction and block ordering).
- Hyperledger Fabric is capable of running smart contracts, or chaincode, and we created a DSA chaincode that enforces simple DSA constraints.
- Hyperledger Fabric stores data in the blockchain as key-value pairs, so in the case of our tuple defined in Section II-E, we map the integrity proof as the key and the remaining tuple elements as the value (represented as a JSON object).
- a blockchain visualization dashboard Hyperledger Explorer [40]
- the first experiment is from the perspective of actors that want to generate data sharing transactions and involves generating a data sharing transaction event (composed of the graphs in Section II-D), storing it in the transaction layer, computing an integrity proof of the event (using incremental cryptography) and writing the integrity proofs to the blockchain.
- the second experiment is from the perspective of those who want to audit the transactions (i.e., verify transaction integrity) and involves querying the transaction layer for a data sharing transaction event, recomputing the event's integrity proof, querying the blockchain for the integrity proof and verifying the integrity.
- the elapsed execution time of both experiments is plotted in FIG. 9 . Each reported elapsed time is the average of three independent executions. It can be seen that the graphs validate the linear time growth of both perspectives.
- Our architecture supports transparency through the use of blockchain technology to allow all participants to query when, what, by whom and why data is being shared in the entire data lifecycle.
- the transparency layer supports the concept of human-in-the-loop by allowing all participants to actively audit the sharing of private health data.
- the transparency layer utilizes a permissioned blockchain network that allows only authenticated participants (e.g. patients, researchers, hospitals) whose identity is verified through a PKI to transact and query the blockchain.
- a PKI allows our network to leverage a multi-signature consensus mechanism where n-out-of-m (where n ⁇ m and n>1) signatures are required to validate transactions.
- proof-of-work consensus mechanisms [28] that are employed in public blockchain networks, a signature consensus only requires a majority of participant signatures to determine valid transactions and write data to the blockchain.
- Our architecture employs access control mechanisms to prevent unauthorized users from accessing private health data.
- the access decision for participants who can perform data sharing transactions is determined at the respective layers through mechanisms such as keys, certificates, tokens, passwords, and institutional access control mechanisms.
- Data sharing transaction types are limited to specific users, for example, T outcome transactions are only performed by AI systems and only authorized users, such as researchers, can view the results, whereas T pointer transactions
- the transparency layer's key feature is the use of a permissioned blockchain, which means this layer must support all six properties.
- the blockchain supports encrypted data over the network and provides an immutable digital ledger of transactions.
- a permissioned blockchain network supports authentication and access control through network entity identification (i.e., digital signatures, certificates). All transactions on the network are digitally signed to achieve non-repudiation.
- a blockchain supports the transparency and accountability of participants on the network since all data interactions are stored on the blockchain and all transactions are verified through a consensus protocol. Furthermore, all data transformations and interactions across the research pipeline can be audited by the blockchain network participants.
- the transaction layer operates as a data query endpoint, which provides confidentiality through data at rest encryption services. Only authenticated and authorized users can interact with the transaction layer to store data relating to data sharing events. Non-repudiation is achieved since all data sharing events stored in the transaction layer are digitally signed by the event generator. All data sharing events capture the provenance and privacy information relating to each individual data sharing event to capture the accountability of all actors participating in the sharing of data. Data sharing event integrity is not directly supported in this layer, rather the integrity proof of the transaction is preserved in the transparency layer.
- the data layer offers data pointer generation services and provides the secure storage for the actual data records. By leveraging data pointers, we support the access control mechanisms enforced at local hospitals where the actual data records reside. Furthermore, the FHIR data pointer framework supports the authentication of users and provides role-based (RBAC) and attribute-based (ABAC) access control mechanisms [35].
- RBAC role-based
- ABAC attribute-based
- the data pointer repositories also support confidentiality by providing encryption services to protect the data at rest. Similar to the transaction layer, the data layer does not directly achieve integrity, non-repudiation, and accountability, rather these properties are indirectly captured in the transparency and transaction layers.
- Table II provides a summary of the system trustworthiness in terms of the six requirements for establishing trust. Although we achieve many of the requirements for establishing trust, there are some limitations with respect to the trust properties. We discuss these limitations in the adversarial threat characterization of Section IV-A.
- an internal attacker has the opportunity to generate and inject fake data sharing events (e.g., to possibly to hide non-compliant actions) into the system to subvert the verification process. Since collaborating participants perform data sharing transactions with each other, an internal attacker could create events that do not represent the true data transformation or activity that occurred (e.g., an adversary could create a fake and misleading privacy event). However, through retrospective auditing and the fact that all network participants are known, the adversary will be caught and identified by their digital signature (assuming the signing key was not stolen or the adversary is not masquerading as another entity). Furthermore, to be successful, an attacker would have to generate and sign a fake data sharing transaction, store the events in the transaction layer, calculate an integrity proof, and have the integrity proof transaction successfully verified and accepted by participants on the blockchain.
- fake data sharing events e.g., to possibly to hide non-compliant actions
- the data layer relies on the institutional-based protection mechanisms for preventing adversarial threats. Since the data layer stores the actual data records, it makes a prime target for an adversary to access private patient data. For this reason, we only interact and store pointers to this data in subsequent architectural layers so that hospitals and research institutes (i.e., data custodians) remain in operational control of their data and can apply their security policies to provide the safe and secure storage of data.
- hospitals and research institutes i.e., data custodians
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Medical Informatics (AREA)
- Bioethics (AREA)
- Public Health (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- Epidemiology (AREA)
- Primary Health Care (AREA)
- Computer Hardware Design (AREA)
- Biomedical Technology (AREA)
- Pathology (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- [1] The Economist, “Apple and amazon's moves in health signal a coming transformation,” February 2018. [Online]. Available: https://www.economist.com/news/business/21736193-worlds-biggest-tech-firms-see-opportunity-health-care-which-could-mean-empowered
- [2] M. Mercuri, M. M. Rehani, and A. J. Einstein, “Tracking patient radiation exposure: Challenges to integrating nuclear medicine with other modalities,” Journal of Nuclear Cardiology, vol. 19, no. 5, pp. 895-900, 2012. [Online]. Available: http://dx.doi.org/10.1007/s12350-012-9586-x
- [3] M. M. Rehani, “Challenges in radiation protection of patients for the 21st century,” American Journal of Roentgenology, vol. 200, no. 4, pp. 762-764, 2013.
- [4] R. Samavi and M. P. Consens, “Publishing 12tap logs to facilitate transparency and accountability,” in The 23rd International World Wide Web Conference (WWW'14) Workshop on Linked Data on the Web, 2014.
- [5] M. J. Field, B. Lo et al., Conflict of interest in medical research, education, and practice. National Academies Press, 2009.
- [6] B. Schneier, Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007.
- [7] P. Alexander, G. Kimmell, and D. Burke, “Security as a system property: Modeling trust and security in rosetta,” 2007.
- [8] Symantec, 2018. [Online]. Available: https://www.symantec.com/
- [9] MIT Kerberos, “Kerberos: The network authentication protocol,” 2009. [Online]. Available: https://web.mit.edu/kerberos/
- [10] Y. Li, “The case analysis of the scandal of enron,” International Journal of business and management, vol. 5, no. 10, p. 37, 2010.
- [11] C. A. Kushida, D. A. Nichols, R. Jadrnicek, R. Miller, J. K. Walsh, and K. Griffin, “Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies,” Medical care, pp. S82-S101, 2012.
- [12] G. S. Nelson, “Practical implications of sharing data: a primer on data privacy, anonymization, and de-identification,” in SAS Global Forum Proceedings, 2015.
- [13] F. Zafar, A. Khan, S. Suhail, I. Ahmed, K. Hameed, H. M. Khan, F. Jabeen, and A. Anjum, “Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes,” Journal of Network and Computer Applications, vol. 94, pp. 50-68, 2017.
- [14] J. Freire, D. Koop, E. Santos, and C. T. Silva, “Provenance for computational tasks: A survey,” Computing in Science & Engineering, vol. 10, no. 3, 2008.
- [15] H. K. Patil and R. Seshadri, “Big data security and privacy issues in healthcare,” in Big Data (BigData Congress), 2014 IEEE International Congress on. IEEE, 2014, pp. 762-765.
- [16] K. Veeramachaneni, I. Arnaldo, A. Cuesta-Infante, V. Korrapati, C. sBassias, and K. Li, “Ai2: Training a big data machine to defend,” in IEEE International Conference on Intelligent Data and Security (IDS'16), April 2016, pp. 49-54.
- [17] HL7 International, “Fhir,” 2017, accessed June 2017. [Online]. Available: https://www.hl7.org/fhir/index.html
- [18] T. Heath and C. Bizer, “Linked data: Evolving the web into a global data space,” Synthesis lectures on the semantic web: theory and technology, vol. 1, no. 1, pp. 1-136, 2011.
- [19] J. J. Carroll, C. Bizer, P. Hayes, and P. Stickler, “Named graphs, provenance and trust,” in Proceedings of the 14th international conference on World Wide Web. ACM, 2005, pp. 613-622.
- [20] R. Samavi and M. P. Consens, “Publishing privacy logs to facilitate transparency and accountability,” in The Journal of Web Semantics, 2018.
- [21] A. Sutton and R. Samavi, “Blockchain enabled privacy audit logs,” in Proceedings of the 16th International Semantic Web Conference. Springer, 2017, pp. 1-16.
- [22] A. Sambra, H. Story, and T. Berners-Lee, “Webid 1.0: Web identity and discovery,” March 2014. [Online]. Available: https://www.w3.org/2005/Incubator/webid/spec/identity/
- [23] M. Mettler, “Blockchain technology in healthcare: The revolution starts here,” in IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom'16), September 2016, pp. 1-3.
- [24] A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “Medrec: Using blockchain for medical data access and permission management,” in 2nd International Conference on Open and Big Data (OBD'16), August 2016, pp. 25-30.
- [25] X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, “Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control,” Journal of Medical Systems, vol. 40, no. 10, p. 218, 2016. [Online]. Available: http://dx.doi.org/10.1007/s10916-016-0574-6
- [26] K. Peterson, R. Deeduvanu, P. Kanjamala, and K. Boles, “A blockchain-based approach to health information exchange networks,” 2016.
- [27] M. Pilkington, “Blockchain technology: principles and applications,” Research Handbook on Digital Transformations, 2015.
- [28] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
- [29] S. Melnik, “Rdf api draft: Cryptographic digests of rdf models and statements,” 2001. [Online]. Available: http://www-db.stanford.edu/˜melnik/rdf/api.html#diges
- [30] J. J. Carroll, “Signing rdf graphs,” in International Semantic Web Conference. Springer, 2003, pp. 369-384.
- [31] C. Sayers and A. H. Karp, “Computing the digest of an rdf graph,” Mobile and Media Systems Laboratory, HP Laboratories, Palo Alto, USA, Tech. Rep. HPL-2003-235, vol. 1, 2004.
- [32] J. A. Fisteus, N. F. Garcia, L. S. Fernandez, and C. D. Kloos, “Hashing and
canonicalizing notation 3 graphs,” Journal of Computer and System Sciences, vol. 76, no. 7, pp. 663-685, 2010. - [33] A. Sutton and R. Samavi, “Timestamp-based integrity proofs for linked data,” in Proceedings of the International Workshop on Semantic Big Data. ACM, 2018, p. 4.
- [34] C. Castelluccia, P. Druschel, S. Hubner, A. Pasic, B. Preneel, and H. Tschofenig, “Privacy, accountability and trust-challenges and opportunities,” ENISA. [Online]. Available: http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/pat-study/at download/fullReport, 2011.
- [35] HL7 International, “Fhir security,” 2017, accessed April 2018. [Online]. Available: https://www.hl7.org/fhir/security.html
- [36] D. Bradbury, “The problem with bitcoin,” Computer Fraud & Security, vol. 2013, no. 11, pp. 5-8, 2013.
- [37] Microsoft, “The stride threat model,” 2005. [Online]. Available: https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx
- [38] OpenLink Software, “Virtuoso universal server,” 2017. [Online]. Available: https://virtuoso.openlinksw.com/
- [39] The Linux Foundation, “Hyperledger fabric documentation,” 2018, accessed June 2017. [Online]. Available: https://hyperledger-fabric.readthedocs.io/en/release-1.1/
- [40]—, “Hyperledger explorer,” 2018. [Online]. Available: https: //www.hyperledger.org/projects/explorer
- [41] L. A. Linn and M. B. Koo, “Blockchain for health data and its potential use in health it and health care related research,” 2017.
- [42] C. McFarlane, M. Beer, J. Brown, and N. Prendergast, “Patientory: A healthcare peer-to-peer emr storage network v1.0,” 2017.
- [43] J. Sotos and D. Houlding, “Blockchains for data sharing in clinical research: Trust in a trustless world,” 2017.
- [44] X. Liang, J. Zhao, S. Shetty, J. Liu, and D. Li, “Integrating blockchain for data sharing and collaboration in mobile healthcare applications,” in Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017 IEEE 28th Annual International Symposium on. IEEE, 2017, pp. 1-5.
- [45] G. Zyskind, O. Nathan, and A. Pentland, “Decentralizing privacy: Using blockchain to protect personal data,” in 2015 IEEE Security and Privacy Workshops, May 2015, pp. 180-184.
- [46] L. Xu, L. Chen, N. Shah, Z. Gao, Y. Lu, and W. Shi, “Dl-bac: Distributed ledger based access control for web applications,” in Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 2017, pp. 1445-1450.
- [47] M. Suleyman and B. Laurie, “Trust, confidence and verifiable data audit,” March 2017. [Online]. Available: https://deepmind.com/blog/trust-confidence-verifiable-data-audit/
- [48] Google, “Trillian,” https://github.com/google/trillian, 2018.
- [49] A. Eijdenberg, B. Laurie, and A. Cutter, “Verifiable data structures,” November 2015. [Online]. Available: https://github.com/google/trillian/blob/master/docsNerifiableDataStructures.pdf
| TABLE II |
| System Trustworthiness Summary |
| Architectural | Non- | |||||
| Component | Conf. | Integrity | Auth. | rep. | Acc. | Avail. |
| Transparency | ✓ | ✓ | ✓ | ✓ | ✓ | Out of |
| Layer | Scope | |||||
| Transaction | ✓ | — | ✓ | ✓ | ✓ | Out of |
| Layer | Scope | |||||
| Data Layer | ✓ | — | ✓ | — | — | Out of |
| Scope | ||||||
can be performed by any user (e.g., researcher or AI system). Since each network participant can be identified through digital signatures, participant authentication and transactions can be verified.
Claims (14)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/552,705 US11244076B2 (en) | 2018-08-30 | 2019-08-27 | Method for enabling trust in collaborative research |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201862724825P | 2018-08-30 | 2018-08-30 | |
| US16/552,705 US11244076B2 (en) | 2018-08-30 | 2019-08-27 | Method for enabling trust in collaborative research |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20200074118A1 US20200074118A1 (en) | 2020-03-05 |
| US11244076B2 true US11244076B2 (en) | 2022-02-08 |
Family
ID=69641371
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/552,705 Active US11244076B2 (en) | 2018-08-30 | 2019-08-27 | Method for enabling trust in collaborative research |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US11244076B2 (en) |
| CA (1) | CA3053148A1 (en) |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12148521B2 (en) * | 2017-10-30 | 2024-11-19 | Koninklijke Philips N.V. | Closed-loop radiological follow-up recommendation system |
| US10915521B2 (en) * | 2018-08-21 | 2021-02-09 | Syniverse Technologies, Llc | Blockchain gateway device and associated method of use |
| CN110070117B (en) * | 2019-04-08 | 2023-04-07 | 腾讯科技(深圳)有限公司 | Data processing method and device |
| CN111950020B (en) * | 2020-07-20 | 2024-04-19 | 北京思特奇信息技术股份有限公司 | Block chain-based data sharing system, method, computing device and storage medium |
| US12471114B2 (en) * | 2020-08-03 | 2025-11-11 | Nokia Technologies Oy | Method to indicate cell support for reduced capability UE |
| US11847193B2 (en) * | 2020-10-22 | 2023-12-19 | Microsoft Technology Licensing, Llc | Data provenance tracking service |
| WO2022120244A1 (en) | 2020-12-03 | 2022-06-09 | Novartis Ag | Collaboration platform for enabling collaboration on data analysis across multiple disparate databases |
| CN113704704B (en) * | 2021-10-28 | 2022-03-15 | 湖南草根文化传媒有限公司 | Collaborative work ownership confirmation method and system based on block chain and computer equipment |
| CN114564286B (en) * | 2021-12-29 | 2023-02-14 | 西安天和防务技术股份有限公司 | Rule engine warning method and rule engine warning system |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20200034553A1 (en) * | 2018-07-29 | 2020-01-30 | Guardtime Ip Holdings Ltd. | System and method for registering multi-party consent |
| US20200076602A1 (en) * | 2018-08-29 | 2020-03-05 | International Business Machines Corporation | Trusted identity solution using blockchain |
| US20200185070A1 (en) * | 2017-08-08 | 2020-06-11 | Quio Technologies Llc | Self-executing agents for gathering health information between trusted parties |
-
2019
- 2019-08-27 US US16/552,705 patent/US11244076B2/en active Active
- 2019-08-27 CA CA3053148A patent/CA3053148A1/en active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20200185070A1 (en) * | 2017-08-08 | 2020-06-11 | Quio Technologies Llc | Self-executing agents for gathering health information between trusted parties |
| US20200034553A1 (en) * | 2018-07-29 | 2020-01-30 | Guardtime Ip Holdings Ltd. | System and method for registering multi-party consent |
| US20200076602A1 (en) * | 2018-08-29 | 2020-03-05 | International Business Machines Corporation | Trusted identity solution using blockchain |
Non-Patent Citations (50)
| Title |
|---|
| "Hyperledger explorer," 2018. Https: //www.hyperledger.org/projects/explorer. Accessed: Nov. 12, 2019. |
| A. Azaria, A. Ekbiaw, T. Vieira, and A. Lippman, "Medrec: Using blockchain for medical data access and permission management," In 2nd International Conference on Open and Big Data (OBD'16), Aug. 2016, pp. 25-30. |
| A. Eijdenberg, B. Laurie, and A. Cutter, "Verifiable data structures," Nov. 2015. Https://www.continusec.com/static/VerifiableDataStructures. Accessed: Nov. 12, 2019. |
| A. Sambra, H. Story, and T. Berners-Lee, "Webid 1.0: Web identity and discovery," Mar. 2014. Available: https://www.w3.org/2005/lncubator/webid/spec/identity/. Accessed: Nov. 7, 2019. |
| A. Sutton and R. Samavi, "Blockchain enabled privacy audit logs," in Proceedings of the 16th International Semantic Web Conference. Springer, 2017, pp. 1-16. |
| A. Sutton and R. Samavi, "Timestamp-based integrity proofs for linked data," Proceedings of the international Workshop on Semantic Big Data. ACM, 2018, p. 4. |
| B. Schneier, "Applied Cryptography: Protocols, Algorithms, and Source Code in C.", John Wiley & Sons. 2nd Edition. Jan. 1, 1996. |
| Blockchain protocols in clinical trials: Transparency and traceability of consent (Fourth Version) Mehdi Benchoufi, Raphael Porcher, Philippe Ravaud https://f1000research.com/articles/6-66/v4 (Year: 2017). * |
| C. A. Kushida, D. A. Nichols, R. Jadmicek, R. Miller, J. K. Walsh, and K. Griffin, "Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies," Medical care, pp. S82-S101, 2012. |
| C. Castelluccia, P. Druschel, S. Hu'bner, A. Pasic, B. Preneel, and H. Tschofenig, "Privacy, accountability and trust—challenges and opportunities," ENISA. Http://www. enisa. europa. eu/activities/identity-and-trust/library/deliverables/pat-study/at download/fullReport, 2011. |
| C. McFarlane, M. Beer, J. Brown, and N. Prendergast, "Patientory: A healthcare peer-to-peer emr storage network v1. 0," 2017. |
| C. Sayers and A. H. Karp, "Computing the digest of an rdf graph," Mobile and Media Systems Laboratory, HP Laboratories, Palo Alto, USA, Tech. Rep. HPL-2003-235, vol. 1, 2004. |
| D. Bradbury, "The problem with bitcoin," Computer Fraud & Security, vol. 2013, No. 11, pp. 5-8, 2013. |
| F. Zafar, A. Khan, S. Suhail, I. Ahmed, K. Hameed, H. M. Khan, F. Jabeen, and A. Anjum, "Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes," Journal of Network and Computer Applications, vol. 94, pp. 50-68, 2017. |
| G. S. Nelson, "Practical implications of sharing data: a primer on data privacy, anonymization, and de-identification," in SAS Global Forum Proceedings, 2015. 23 pages. |
| G. Zyskind, O. Nathan, and A. Pentiand, "Decentralizing privacy: Using blockchain to protect personal data," in 2015 IEEE Security and Privacy Workshops, May 2015, pp. 180-184. |
| Google, "Trillian: A Transparent, Highly Scalable and Cryptographically Verifiable Data Store," Https://github.com/google/trillian, 2018. Accessed: Nov. 12, 2019. |
| H. K. Patil and R. Seshadri, "Big data security and privacy issues in healthcare," Big Data (BigData Congress), 2014 IEEE International Congress on. IEEE, 2014, pp. 762-765. |
| HL7 International, "Fhir security," 2017, accessed Apr. 2018. Https://www.hl7.org/fhir/security.html. |
| HL7 International, "Fhir," 2017, accessed Jun. 2017. [Online]. Available: https://www.hl7.org/fhir/index.html. |
| J. Freire, D. Koop, E. Santos, and C. T. Silva, "Provenance for compu- tational tasks: A survey," Computing in Science & Engineering, vol. 10, No. 3, 2008. |
| J. J. Carroll, "Signing rdf graphs," in International Semantic Web Conference. Springer, 2003, pp. 369-384. |
| J. J. Carroll, C. Bizer, P. Hayes, and P. Stickler, "Named graphs, prove- nance and trust," in Proceedings of the 14th international conference on World Wide Web. ACM, 2005, pp. 613-622. |
| J. Sotos and D. Houlding, "Blockchains for data sharing in clinical research: Trust in a trustless world," 2017. |
| J.A.Fisteus, N.F.Garc'ia, L.S. Ferna'ndez, andC.D.Kloos, "Hashing and canonicalizing notation 3 graphs," Journal of Computer and System Sciences, vol. 76, No. 7, pp. 663-685, 2010. |
| K. Veeramachaneni, I. Arnaldo, A. Cuesta-Infante, V. Korrapati, C. sBassias, and K. Li, "Ai2: Training a big data machine to defend," in IEEE International Conference on Intelligent Data and Security (IDS'16), Apr. 2016, pp. 49-54. |
| K.Peterson, R.Deeduvanu, P.Kanjamala, and K.Boles, "A blockchain-based approach to health information exchange networks," 2016. 10 pages. |
| L. A. Linn and M. B. Koo, "Blockchain for health data and its potential use in health it and health care related research," 2017. |
| L. Xu, L. Chen, N. Shah, Z. Gao, Y. Lu, and W. Shi, "Dl-bac: Distributed ledger based access control for web applications," in Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 2017, pp. 1445-1450. |
| M. J. Field, B. Lo et al., "Conflict of interest in medical research, education, and practice", Institute of Medicine of the National Academies, 2009, 436 pages. |
| M. M. Rehani, "Challenges in radiation protection of patients for the 21st century," American Journal of Roentgenology, vol. 200, No. 4, pp. 762-764, 2013. |
| M. Mercuri, M. M. Rehani, and A. J. Einstein, "Tracking patient radiation exposure: Challenges to integrating nuclear medicine with other modalities," Journal of Nuclear Cardiology, vol. 19, No. 5, pp. 895-900, 2012. |
| M. Mettler, "Blockchain technology in healthcare: The revolution starts here," in IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom'16), Sep. 2016, pp. 1-3. Abstract. |
| M. Pilkington, "Blockchain technology: principles and applications," Research Handbook on Digital Transformations, 2015. 39 pages. |
| M. Suleyman and B. Laurie, "Trust, confidence and verifiable data audit," Mar. 2017. Https://deepmind.com/blog/trust- confidence- verifiable- data- audit/. |
| Microsoft, "The stride threat model," 2005. Https://msdn.microsoft.com/en- us/librarylee823878(v=cs.20).aspx. |
| MIT Kerberos, "Kerberos: The network authentication protocol," 2009. https://web.mit.edu/kerberos/. Accessed Nov. 5, 2019. |
| OpenLink Software, "Virtuoso universal server," 2017. Https://virtuoso.openlinksw.com/. |
| P. Alexander, G. Kimmell, and D. Burke, "Security as a system property: Modeling Trust and Security in Rosetta," Jan. 4, 2007. pp. 1-24. |
| R. Samavi and M. P. Consens, "Publishing I2tap logs to facilitate transparency and accountability," in The 23rd International World Wide Web Conference (WWW'14) Workshop on Linked Data on the Web, 2014. |
| R. Samavi and M. P. Consens, "Publishing privacy logs to facilitate transparency and accountability," in The Journal of Web Semantics, 2018. |
| S. Melnik, "Rdf api draft: Cryptographic digests of rdf models and statements," 2001. Https://www- db.stanford.edu/˜melnik/rdf/api.htmi#diges. Accessed: Nov. 7, 2019. |
| S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," http://www.bitcoin.org. Accessed: Nov. 7, 2019. 2008. |
| Symantec, 2018. [Online]. Available: https://www.symantec.com/. Accessed: Nov. 12, 2019. |
| T. Heath and C. Bizer, "Linked data: Evolving the web into a global data space," Synthesis lectures on the semantic web: theory and technology, vol. 1, No. 1, pp. 1-136, 2011. |
| The Economist, "Apple and amazon's moves in health signal a coming transformation," Feb. 2018. [Online]. Available: https://www.economist.com/news/business/21736193- worlds- biggest- tech- firms- see- opportunity- health-care- which- could- mean- empowered. |
| The Linux Foundation, "Hyperledger fabric documentation," 2018, accessed Jun. 2017. Available: https://hyperledger-fabric.readthedocs.io/en/release- 1.1/. |
| X. Liang, J. Zhao, S. Shetty, J. Liu, and D. Li, "Integrating blockchain for data sharing and collaboration in mobile healthcare applications," in Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017 IEEE 28th Annual International Symposium on. IEEE, 2017, pp. 1-5. |
| X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, "Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control," Journal of Medical Systems, vol. 40, No. 10, p. 218, 2016. Abstract. |
| Y. Li, "The case analysis of the scandal of enron," International Journal of business and management, vol. 5, No. 10, p. 37, 2010. |
Also Published As
| Publication number | Publication date |
|---|---|
| CA3053148A1 (en) | 2020-02-29 |
| US20200074118A1 (en) | 2020-03-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11244076B2 (en) | Method for enabling trust in collaborative research | |
| Chenthara et al. | Healthchain: A novel framework on privacy preservation of electronic health records using blockchain technology | |
| Zhang et al. | Security and privacy for healthcare blockchains | |
| Kaur et al. | Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS | |
| Fabian et al. | Collaborative and secure sharing of healthcare data in multi-clouds | |
| Kumar et al. | Secure approach to sharing digitized medical data in a cloud environment | |
| Babu et al. | MediBlocks: secure exchanging of electronic health records (EHRs) using trust-based blockchain network with privacy concerns | |
| Lee et al. | MEXchange: a privacy-preserving blockchain-based framework for health information exchange using ring signature and stealth address | |
| Zhang et al. | A Secure and Privacy‐Preserving Medical Data Sharing via Consortium Blockchain | |
| Ghorbel et al. | Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain | |
| Yang et al. | An access control model based on blockchain master-sidechain collaboration | |
| Bodur et al. | An Improved blockchain-based secure medical record sharing scheme | |
| Rashid et al. | RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations | |
| Barbaria et al. | Leveraging patient information sharing using blockchain-based distributed networks | |
| Tawfik et al. | Blockchain-based access control and privacy preservation in healthcare: a comprehensive survey | |
| Thilagavathy et al. | RETRACTED ARTICLE: A novel framework paradigm for EMR management cloud system authentication using blockchain security network | |
| Ouaddah et al. | FairAccess2. 0: a smart contract-based authorisation framework for enabling granular access control in IoT | |
| Tawfik et al. | ACHealthChain blockchain framework for access control and privacy preservation in healthcare | |
| Mudhar et al. | Blockchain-based decentralized access control framework for enhanced security and privacy for consumer electronic devices | |
| Alansari | A blockchain-based approach for secure, transparent and accountable personal data sharing | |
| Kala et al. | Smart IoT-blockchain security to secure sensitive personal medical data using shuffled random starvation link encryption | |
| Husnain et al. | HealthChain: A blockchain‐based framework for secure and interoperable electronic health records (EHRs) | |
| Chakravarthy et al. | Enhancing confidentiality and access control in electronic health record systems using a hybrid hashing blockchain framework | |
| Kaur et al. | Healthcare data security and privacy protection framework based on dual channel blockchain | |
| Tiwari et al. | A healthcare data management system: blockchain-enabled IPFS providing algorithmic solutions for increased privacy-preserving scalability and interoperability |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP., ISSUE FEE NOT PAID |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| AS | Assignment |
Owner name: MCMASTER UNIVERSITY, CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAMAVI, REZA;DOYLE, THOMAS;SUTTON, ANDREW;AND OTHERS;SIGNING DATES FROM 20211110 TO 20211122;REEL/FRAME:058350/0164 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |